Ethical and Social Issues in Information Systems
50 questions available
Questions
According to the case study on ethical issues for the aged community, what is a primary recurring ethical issue associated with 'Smart House' technology?
View answer and explanationWhat are the five moral dimensions of the information age identified in the chapter?
View answer and explanationWhich technology trend involves combining data from multiple sources to create detailed electronic dossiers of individuals?
View answer and explanationWhat is the primary purpose of Nonobvious Relationship Awareness (NORA) technology?
View answer and explanationWhich ethical principle suggests that if an action is not right for everyone to take, it is not right for anyone?
View answer and explanationWhat is the ethical 'no free lunch' rule, as described in the chapter?
View answer and explanationWhat is the most important U.S. federal law regulating the federal government's collection, use, and disclosure of information?
View answer and explanationThe European Directive on Data Protection requires companies to obtain what before they can legally use data about an individual?
View answer and explanationWhat is the primary method by which websites like Amazon.com track a visitor's activity and customize content for them upon return?
View answer and explanationWhat U.S. law makes it illegal to circumvent technology-based protections of copyrighted materials?
View answer and explanationWhich of the following is NOT considered a principal source of poor system performance?
View answer and explanationThe term for stress induced by computer use, with symptoms like aggravation, hostility, and impatience, is known as:
View answer and explanationIn the Interactive Session about the iPhone becoming an iTrack, what was the primary commercial value of the location data gathered from cell phones?
View answer and explanationWhat is the core principle of the Fair Information Practices (FIP) regime?
View answer and explanationWhat is the legal protection for an intellectual work product, such as a formula or business process, that is not based on information in the public domain?
View answer and explanationWhat did GlaxoSmithKline pay in fines in 2012 for unlawful promotion of drugs and other civil and criminal liabilities?
View answer and explanationWhat is the first step in the five-step process for ethical analysis presented in the chapter?
View answer and explanationWhich of the following best describes the opt-out model of informed consent?
View answer and explanationWhat is the primary drawback of copyright protection for software?
View answer and explanationA study by Symantec in 2012 found that what percentage of malware was being targeted at small businesses?
View answer and explanationThe case study on monitoring in the workplace discusses a legal case (Copeland v the United Kingdom) where the European Court ruled in the employee's favor. On what grounds was the employee's privacy deemed violated?
View answer and explanationWhich of the following is NOT one of the FTC's Fair Information Practice principles?
View answer and explanationAccording to the chapter, what is the 'digital divide'?
View answer and explanationThe case study 'Facebook: It’s About the Money' states that in 2011, advertising revenue constituted what percentage of Facebook's total revenue?
View answer and explanationThe concept of liability, a key element of ethical action, is defined as a feature of which type of system?
View answer and explanationWhat is the main purpose of professional codes of conduct, such as those from the ACM or AMA?
View answer and explanationThe European Directive on Data Protection, which went into effect on October 25, 1998, is stricter than U.S. law primarily because:
View answer and explanationIn the case of the BlackBerry outage in October 2011, what was the primary cause of the cascading failure?
View answer and explanationAccording to the chapter, what is the single largest source of Repetitive Stress Injury (RSI)?
View answer and explanationApproximately what percentage of people who spend three or more hours per day at a computer are affected by Computer Vision Syndrome (CVS)?
View answer and explanationWhat is the primary difference between a trade secret and a patent?
View answer and explanationThe 2011 report from the Internet Crime Complaint Center (IC3) found the average financial loss for complainants was more than:
View answer and explanationAccording to the chapter, which two technology trends are most directly responsible for making the routine violation of individual privacy cheap and effective?
View answer and explanationWhat does 'accountability' mean as a basic concept in ethics?
View answer and explanationThe proposed 'Do-Not-Track Online Act of 2011' would require firms to:
View answer and explanationHow does patent law differ from copyright law in what it protects?
View answer and explanationThe Ninth Annual Global Software Piracy Study reported that the rate of global software piracy climbed to what percentage in 2011?
View answer and explanationWhat is the primary reason it is so difficult to hold software producers liable for damages from their software?
View answer and explanationThe term 'spam' is described as junk e-mail sent to a mass audience of Internet users. Approximately what percentage of all e-mail was estimated to be spam in 2012?
View answer and explanationWhat is the primary argument made by economists like Erik Brynjolfsson and Andrew P. McAfee regarding the impact of new technology on employment?
View answer and explanationIn the Facebook case study, what is 'weblining'?
View answer and explanationAccording to a Consumer Reports study cited in the Facebook case study, how many of the 150 million Americans on Facebook have never adjusted their privacy controls?
View answer and explanationWhat does the concept of 'due process' ensure in a law-governed society?
View answer and explanationDescartes' rule of change is also known as the:
View answer and explanationWhat is the primary function of Web beacons?
View answer and explanationIn what year did the European Parliament pass new rules governing the use of third-party cookies for behavioral tracking?
View answer and explanationWhat is the primary difference between a computer virus and a computer worm?
View answer and explanationThe practice of tricking employees into revealing their passwords by pretending to be legitimate members of a company is known as:
View answer and explanationIn the case study about the aged community, what social and cultural consideration might make sensor-based monitoring systems unacceptable?
View answer and explanationWhat type of intellectual property protection grants an exclusive monopoly on the ideas behind an invention for 20 years?
View answer and explanation